Use of Non-Maximal entangled state for free space BBM92 quantum key
distribution protocol
- URL: http://arxiv.org/abs/2307.02149v2
- Date: Thu, 6 Jul 2023 10:51:52 GMT
- Title: Use of Non-Maximal entangled state for free space BBM92 quantum key
distribution protocol
- Authors: Ayan Biswas, Sarika Mishra, Satyajeet Patil, Anindya Banerji, Shashi
Prabhakar, and Ravindra P. Singh
- Abstract summary: Satellite-based quantum communication for secure key distribution is becoming a more demanding field of research due to its unbreakable security.
In entanglement-based protocols such as BB84 consider the satellite as a trusted device, fraught with danger.
BBM92 protocol will be more beneficial for key distribution as we found a linear connection between the extent of violation for Bell-CHSH inequality and the quantum bit error rate for a given setup.
- Score: 1.4177373944288099
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Satellite-based quantum communication for secure key distribution is becoming
a more demanding field of research due to its unbreakable security. Prepare and
measure protocols such as BB84 consider the satellite as a trusted device,
fraught with danger looking at the current trend for satellite-based optical
communication. Therefore, entanglement-based protocols must be preferred since,
along with overcoming the distance limitation, one can consider the satellite
as an untrusted device too. E91 protocol is a good candidate for
satellite-based quantum communication; but the key rate is low as most of the
measured qubits are utilized to verify a Bell-CHSH inequality to ensure
security against Eve. An entanglement-based protocol requires a maximally
entangled state for more secure key distribution. The current work discusses
the effect of non-maximality on secure key distribution. It establishes a lower
bound on the non-maximality condition below which no secure key can be
extracted. BBM92 protocol will be more beneficial for key distribution as we
found a linear connection between the extent of violation for Bell-CHSH
inequality and the quantum bit error rate for a given setup.
Related papers
- Quantum Keyless Private Communication with Decoy States for Space Channels [0.0]
We present the security analysis of a keyless quantum private communication protocol that transmits classical information over quantum states.
Our protocol sends dummy (decoy) states optimally obtained from the true information to deceive the eavesdropper.
Our protocol can be implemented with the state of the art space proof technology.
arXiv Detail & Related papers (2024-09-09T15:09:01Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Analysing QBER and secure key rate under various losses for satellite
based free space QKD [0.0]
We have done a comparison between the BB84 and B92 protocols and BBM92 and E91 entanglement based protocols for satellite based uplink and downlink in low Earth orbit.
The results indicate that, when compared to the B92 protocol, the BB84 protocol guarantees the distribution of a higher secure keyrate for a specific distance.
arXiv Detail & Related papers (2023-08-02T09:28:50Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Satellite-Based Quantum Key Distribution in the Presence of Bypass
Channels [44.81834231082477]
Security of quantum key distribution under restricted eavesdropping scenarios is addressed.
We find regimes of operation in which the above restrictions on Eve can considerably improve system performance.
Our work opens up new security frameworks for spaceborne quantum communications systems.
arXiv Detail & Related papers (2022-12-09T12:24:40Z) - BBM92 quantum key distribution over a free space dusty channel of 200
meters [1.1416499867566623]
This work reports the implementation of BBM92 protocol, an entanglement-based QKD protocol over 200 m distance.
Results show the effect of atmospheric aerosols on sift key rate, and eventually, secure key rate.
arXiv Detail & Related papers (2021-12-22T15:34:13Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Quantum direct communication protocols using discrete-time quantum walk [1.9551668880584971]
We propose two quan-tum direct communication protocols, a Quantum Secure Direct Communication (QSDC) protocoland a Controlled Quantum Dialogue (CQD) protocol using discrete-time quantum walk on a cycle.
The proposed protocols are unconditionally secure against various attacks such as the intercept-resend attack, the denial of service attack, and the man-in-the-middle attack.
arXiv Detail & Related papers (2020-04-07T11:16:09Z) - Asymptotic security analysis of teleportation based quantum cryptography [0.0]
We prove that the teleportation based quantum cryptography protocol presented in [Opt. Commun 283, 184] is secure against all types of individual and collective attacks.
We then investigate modifications to that protocol leading to greater secret-key rates and to security against coherent attacks.
arXiv Detail & Related papers (2020-02-10T17:54:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.